A newly discovered vulnerability in the Linux kernel's cryptographic template allows unprivileged users to gain root access through a simple page cache manipulation, affecting distributions released since 2017.
A significant security vulnerability affecting the Linux kernel has been disclosed, enabling local privilege escalation through a flaw in the authencesn cryptographic template. Dubbed 'Copy Fail' (CVE-2026-31431), this vulnerability allows an unprivileged local user to gain root access by writing just four controlled bytes into the page cache of any readable file on a Linux system.

The vulnerability works by exploiting how the Linux kernel reads the page cache when loading binaries. By modifying the cached copy of a file, an attacker can effectively alter the binary for program execution without triggering file system monitoring defenses like inotify. The proof of concept exploit is remarkably small—a 10-line, 732-byte Python script capable of editing a setuid binary to gain root privileges on almost all Linux distributions released since 2017.
"This represents a fundamental weakness in how Linux handles page caching during binary execution," explains security researcher Taeyang Lee, who discovered the vulnerability with help from Theori's AI security scanning software, Xint Code. "The fact that such a minimal exploit can achieve root access demonstrates a critical gap in the kernel's security model."
Copy Fail bears similarities to other local privilege escalation vulnerabilities like Dirty Cow and Dirty Pipe, but researchers note it doesn't require winning a race condition and is more broadly applicable. While not remotely exploitable on its own, the vulnerability becomes particularly dangerous when chained with other exploits such as remote code execution vulnerabilities, malicious CI runners, or SSH compromises.
The vulnerability poses the most immediate risk to organizations using multi-tenant Linux systems, shared-kernel containers, or CI runners that execute untrusted code. Additionally, Theori researchers warn that the vulnerability represents a potential container escape primitive that could affect Kubernetes nodes, as the page cache is shared across the host system.
Major Linux distributions have moved quickly to address the issue. Debian, Ubuntu, and SUSE have all issued patches for the problem, while Red Hat initially indicated it would defer the fix before later changing its guidance to align with other distributions and patch promptly. The vulnerability has been rated High severity with a score of 7.8 out of 10 on the CVSS scale.
The discovery comes amid a surge in vulnerability reports, with security experts attributing part of the increase to AI-powered security tools. "There are many things we could speculate on to justify the size, but if Microsoft is like the other programs out there (including ours), they are likely seeing a rise in submissions found by AI tools," wrote Dustin Childs, head of threat awareness for Trend Micro's Zero Day Initiative.
This AI-assisted vulnerability research recently prompted the Internet Bug Bounty (IBB) program to suspend awards until it can develop a framework for managing the growing volume of reports. The acceleration in vulnerability discovery presents both challenges and opportunities for the security community—while more vulnerabilities are being found, the sheer volume may strain existing response mechanisms.
For organizations running affected Linux systems, immediate patching is the most critical mitigation step. For those unable to patch immediately, researchers recommend implementing additional controls such as restricting access to setuid binaries and implementing strict container isolation measures. The vulnerability underscores the importance of maintaining defense-in-depth strategies, as even seemingly minor flaws can lead to complete system compromise when combined with other vulnerabilities.
The discovery of Copy Fail highlights the ongoing cat-and-mouse game between security researchers and system developers. As Linux continues to dominate server infrastructure and increasingly powers critical systems, the pressure to maintain robust security postures only intensifies. The relatively simple nature of this exploit serves as a reminder that security vulnerabilities can exist in the most fundamental components of our systems, requiring constant vigilance and rapid response from the entire Linux ecosystem.

Comments
Please log in or register to join the discussion